Lines Matching full:check
143 * outside this condition, so the check is removed. in DNS_ReadNameField()
172 * outside this condition, so the check is removed. in DNS_ReadNameField()
183 /* Here, there is no need to check for pucByte[ uxindex ] == 0 because: in DNS_ReadNameField()
185 * failing above check. Whenever we exit the loop otherwise, either in DNS_ReadNameField()
186 * pucByte[ uxIndex ] == 0 (which makes the check here unnecessary) or in DNS_ReadNameField()
294 /* TODO cross check again */
382 /* Check for a malformed response. */ in DNS_ParseDNSReply()
393 /* Check the remaining buffer size. */ in DNS_ParseDNSReply()
433 /* No need to check that pcRequestedName != NULL since sQuestions != 0, then in DNS_ParseDNSReply()
436 /* No need to check that usQuestions != 0, since the check is done before */ in DNS_ParseDNSReply()
659 /* Check for a malformed response. */ in parseDNSAnswer()
695 pxSet->uxAddressLength = ipSIZE_OF_IPv4_ADDRESS; /*TODO check if fine */ in parseDNSAnswer()
720 /* Sanity check the data length of an IPv4 answer. */ in parseDNSAnswer()
724 …if( pxSet->uxAddressLength == ipSIZE_OF_IPv6_ADDRESS ) /*No check needed for pxSet->usType as uxAd… in parseDNSAnswer()
850 FreeRTOS_printf( ( "DNS sanity check failed: %u != %u\n", in parseDNSAnswer()
1037 /* Check for minimum buffer size: 92 bytes. */ in DNS_TreatNBNS()